Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Data structures and algorithms with object-oriented design patterns in C++
Data structures and algorithms with object-oriented design patterns in C++
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
Capacity of Ad Hoc wireless networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Reliable group rekeying: a performance analysis
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A Secure Audio Teleconference System
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Communication-Efficient Group Key Agreement
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation.
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
Mesh networks: commodity multihop ad hoc networks
IEEE Communications Magazine
Scalable secure one-to-many group communication using dual encryption
Computer Communications
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Group key management (GKM) refers to the actions taken to up-date and distribute the group key upon members joining and leaving a multicast group. Although there exist several GKM schemes, they are not readily applicable to wireless mesh networks (WMNs) due to many differences between WMNs and wireline networks. We present a review of existing GKM protocols and identify their applicability to WMNs. Based on the review, we propose a framework for scalable and efficient GKM in WMNs, and a GKM protocol named CCoKA (Centralized COntributory Key Agreement) for use in a WMN. CCoKA is based on the scalable and efficient key tree approach and the well-known Diffie-Hellman cryptographic protocol. The proposed framework and CCoKA protocol take into account the characteristics of mesh network operations, wireless routers and mobile devices. We also suggest directions for future research on GKM in WMNs.